When SEGs Fail: Threat Actors Abuse Docusign to Launch Sophisticated Phishing Attacks
At Abnormal Security, we’ve seen a surge in phishing campaigns exploiting Docusign, a trusted platform for electronic signatures. These attacks take advantage of Docusign’s credibility to bypass traditional email defenses, tricking recipients into sharing sensitive information or transferring money.
Despite Docusign issuing a Public Service Announcement (PSA) in late 2024 to warn users, attackers continue refining their techniques—leveraging trusted brands to carry out sophisticated phishing campaigns.
How These Attacks Work
Phishing emails mimicking Docusign notifications exploit brand trust to deceive recipients. Abnormal Security has identified a few recurring tactics used in these attacks.
![Docusign1](/_next/image?url=https%3A%2F%2Fimages.abnormalsecurity.com%2Fproduction%2Fimages%2Fblog%2FDocusign1_2025-02-05-223128_tyoy.png%3Fw%3D1536%26h%3D1639%26auto%3Dcompress%252Cformat%26fit%3Dcrop%26dm%3D1738794690%26s%3D5ebc4d28f575b527dd885e331a1b0887&w=3840&q=75)
As you can see from the example above, these tactics include:
Low-Context File Sharing Links: Emails often contain Docusign links with vague or no explanation of the document’s purpose.
Unusual Senders: Attackers impersonate Docusign using email addresses with no prior interaction with recipients.
Suspicious Financial Requests: Many emails request payment adjustments or fund transfers, actions uncommon for the recipient’s role.
Reply-To Mismatch: Reply-To domains rarely match Docusign or the sender’s domain.
Credential Theft: The email content is often designed to steal sensitive information like login credentials or payment details.
Why Traditional Email Security Fails
Legacy email security solutions, like secure email gateways (SEGs), are not equipped to detect sophisticated phishing attacks that exploit trusted platforms like Docusign. Here’s why:
- Static Rules and Whitelists: SEGs rely on static rules, keyword matching, and allowlists to filter emails. While this works for broad, easily identifiable attacks, it is ineffective against sophisticated threats that use trusted domains like Docusign to bypass defenses.
- Lack of Behavioral Analysis: SEGs do not analyze user or organizational behavior to identify anomalies. For instance, they cannot detect when an email is inconsistent with the recipient’s typical interactions or role-specific responsibilities.
- Insufficient Contextual Awareness: Traditional systems focus on email headers and authentication protocols (e.g., SPF, DKIM, and DMARC). These methods verify the domain but cannot flag misuse of legitimate accounts or platforms.
By relying on outdated approaches, SEGs create a false sense of security, leaving organizations vulnerable to advanced phishing campaigns.
How Abnormal Detects Sophisticated Phishing Attacks
Abnormal’s AI-native platform continuously learns your organization’s unique behavior patterns to detect even the most sophisticated threats. Here’s how we stopped an attack abusing Docusign:
Behavioral Anomaly: The sender had no prior interaction with the recipient, a red flag detected by Abnormal’s models.
Low-Context Link: The Docusign link was flagged as suspicious, correlating with patterns used in previous phishing campaigns.
Unusual Request: The email urged a payment adjustment—an action uncommon for the recipient’s role.
Reply-To Mismatch: The Reply-To domain differed from both Docusign and the sender’s domain, further raising suspicion.
Abnormal identified this email as malicious in real-time, removing it from the user’s inbox before it could cause harm. This underscores Abnormal’s ability to detect and neutralize threats—even those leveraging trusted platforms.
Stay Ahead of Evolving Threats with AI-Powered Email Security
As attackers grow more sophisticated, exploiting trusted platforms like Docusign, traditional email security solutions fall behind. Protecting your organization requires a proactive, AI-powered approach capable of understanding user behavior and intent.
Discover how Abnormal Security safeguards your organization from advanced phishing attacks. Schedule a demo today!
Get AI Protection for Your Human Interactions
![](https://img.plasmic.app/img-optimizer/v1/img?src=https%3A%2F%2Fimg.plasmic.app%2Fimg-optimizer%2Fv1%2Fimg%2F1620b1b4a7ef96a0cf0f5552dbf9d14c.png&q=75)